咨询与建议

限定检索结果

文献类型

  • 1,069 篇 会议
  • 1,001 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,072 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,372 篇 工学
    • 902 篇 计算机科学与技术...
    • 694 篇 软件工程
    • 440 篇 信息与通信工程
    • 197 篇 电子科学与技术(可...
    • 182 篇 电气工程
    • 139 篇 控制科学与工程
    • 92 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 77 篇 机械工程
    • 73 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 36 篇 土木工程
    • 36 篇 交通运输工程
    • 35 篇 航空宇航科学与技...
  • 609 篇 理学
    • 386 篇 数学
    • 137 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 365 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 36 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 164 篇 school of comput...
  • 160 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 71 篇 state key labora...
  • 62 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 34 篇 school of inform...
  • 31 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 29 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,814 篇 英文
  • 150 篇 其他
  • 111 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2072 条 记 录,以下是201-210 订阅
排序:
Multi-class Bitcoin mixing service identification based on graph classification
收藏 引用
Digital Communications and networks 2024年 第6期10卷 1881-1893页
作者: Xiaoyan Hu Meiqun Gui Guang Cheng Ruidong Li Hua Wu School of Cyber Science&Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories for Network and Communication Security Nanjing 211111China Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network Nanjing 211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina Research Base of International Cyberspace Governance Southeast UniversityNanjing 211189China Institute of Science and Engineering Kanazawa UniversityKakumaKanazawa920-1192Japan
Due to its anonymity and decentralization,Bitcoin has long been a haven for various illegal *** generally legalize illicit funds by Bitcoin mixing ***,it is critical to investigate the mixing services in cryptocurrenc... 详细信息
来源: 评论
Improving Accuracy-robustness Trade-off via Pixel Reweighted Adversarial Training  41
Improving Accuracy-robustness Trade-off via Pixel Reweighted...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Zhang, Jiacheng Liu, Feng Zhou, Dawei Zhang, Jingfeng Liu, Tongliang School of Computing and Information Systems The University of Melbourne Australia State Key Laboratory of Integrated Services Networks Xidian University China School of Computer Science The University of Auckland New Zealand RIKEN AIP Japan Sydney AI Centre The University of Sydney Australia
Adversarial training (AT) trains models using adversarial examples (AEs), which are natural images modified with specific perturbations to mislead the *** perturbations are constrained by a predefined perturbation bud... 详细信息
来源: 评论
Boosting Consistency in Dual Training for Long-Tailed Semi-Supervised Learning
arXiv
收藏 引用
arXiv 2024年
作者: Gan, Kai Wei, Tong Zhang, Min-Ling The School of Computer Science and Engineering Southeast University Nanjing210096 China The Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
While long-tailed semi-supervised learning (LTSSL) has received tremendous attention in many real-world classification problems, existing LTSSL algorithms typically assume that the class distributions of labeled and u... 详细信息
来源: 评论
Multimodal Aspect-Based Sentiment Analysis under Conditional Relation  31
Multimodal Aspect-Based Sentiment Analysis under Conditional...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Liu, Xinjing Li, Ruifan Ye, Shuqin Zhang, Guangwei Wang, Xiaojie School of Artificial Intelligence Beijing University of Posts and Telecommunications China School of Computer Science Beijing University of Posts and Telecommunications China Engineering Research Center of Information Networks Ministry of Education China Key Laboratory of Interactive Technology and Experience System Ministry of Culture and Tourism China
Multimodal Aspect-Based Sentiment Analysis (MABSA) aims to extract aspect terms from text-image pairs and identify their sentiments. Previous methods are based on the premise that the image contains the objects referr... 详细信息
来源: 评论
Nanoseconds CDR Enabled by Clock Distribution and Protection Sequence Insertion in Optical
Nanoseconds CDR Enabled by Clock Distribution and Protection...
收藏 引用
2023 Opto-Electronics and Communications Conference, OECC 2023
作者: Zhao, Yisong Yang, Changsheng Dang, Daohang Guo, Yuanzhi Shen, Shikui Wen, Ran Chen, Bin Guo, Bingli Yang, Chuanchuan Hua, Nan Xue, Xuwei Huang, Shanguo Beijing University of Posts and Telecommunications State Key Laboratory of Information Photonics and Optical Communications Beijing China China Unicom Research Institute Beijing China Hefei University of Technology School of Computer Science and Information Engineering Hefei China Peking University The State Key Laboratory of Advanced Optical Communication Systems and Networks Beijing China Beijing China
The scheme combining clock distribution and protection sequence insertion from the network perspective is proposed and experimentally investigated to implement a 3.1 nanoseconds clock and data recovery in optical swit... 详细信息
来源: 评论
Spatial-Temporal Aware Business Event Forecasting for Proactive Services from IoT Sensory Data  26
Spatial-Temporal Aware Business Event Forecasting for Proact...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Zhang, Jiayu Wang, Guiling Shi, Yongpeng Zheng, Xin Yu, Jian Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data Beijing China North China University of Technology School of Information Science and Technology Beijing China Auckland University of Technology Department of Computer Science Auckland New Zealand
With the development of IoT and AI, better knowledge and information can be learned and extracted from IoT sensory data which enables business systems to proactively provide services to customers. This paper is the fi... 详细信息
来源: 评论
H-MGSR: A Hierarchical Motif-based Graph Attention Neural Network for Service Recommendation
H-MGSR: A Hierarchical Motif-based Graph Attention Neural Ne...
收藏 引用
2023 IEEE International Conference on Web Services, ICWS 2023
作者: Zheng, Xin Wang, Guiling Zhang, Jiayu Zhang, Yuqi Wang, Nancy Yu, Jian Han, Yanbo Beijing Key Laboratory on Integration and Analysis of Large-scale Stream Data Beijing China North China University of Technology School of Information Science and Technology Beijing China Auckland University of Technology Department of Computer Science Auckland New Zealand
The rapid development of web services has made it increasingly challenging for developers to find desired web services. To address this issue, researchers have developed various powerful models for service recommender... 详细信息
来源: 评论
A Dynamic Binding Method for Situation-aware IoT Services Targeting Proactive BPM  26
A Dynamic Binding Method for Situation-aware IoT Services Ta...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Li, Xiuxian Wang, Guiling Shi, Yongpeng Yu, Jian Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data Beijing China North China University of Technology School of Information Science and Technology Beijing China Auckland University of Technology Department of Computer Science Auckland New Zealand
By leveraging IoT data, Business Process Management (BPM) systems can sense the physical world situation and make more accurate decisions proactively, but the current BPM systems lack the effective method to take good... 详细信息
来源: 评论
Cryptanalysis of PRIMATEs
收藏 引用
Science China(information Sciences) 2020年 第1期63卷 130-139页
作者: Yanbin LI Meiqin WANG Wenqing LIU Wei WANG Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University Shandong Provincial Key Laboratory of Computer Networks
PRIMATEs is a family of authenticated encryption design submitted to competition for authenticated encryption: security, applicability, and robustness. The three modes of operation in PRIMATEs family are: APE, HANUMAN... 详细信息
来源: 评论
Integrated Communication, Navigation, and Remote Sensing in LEO networks with Vehicular Applications
arXiv
收藏 引用
arXiv 2024年
作者: Sheng, Min Guo, Chongtao Huang, Lei State Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China The State Key Laboratory of Radio Frequency Heterogeneous Integration College of Electronics and Information Engineering Shenzhen University Shenzhen518060 China
Traditionally, communication, navigation, and remote sensing (CNR) satellites are separately performed, leading to resource waste, information isolation, and independent optimization for each functionality. Taking fut... 详细信息
来源: 评论